Unit 8 Computer Networking Text Data Communications Exercises Fill in the blanks with appropriate words according to the text. (1) The end equipment is either generates the digital information for transmission or uses the received digital data (2)When digital data are transmitted, they are in serial form (3) DTE is data terminal equipment. (4) STACO is the corresponding unit at the secondaries (5)Between the DTEs, first is the modems, and then is communications equipment DCE accepts the serial data stream from the DtE At the transmit end the modem can be considered a form of digital-to-analog converter. while at the receive end. it can be considered a form of analog-to-digital converter (8) DCE converts the received analog signal to a serial digital data stream 2. Multiple choices (1) The end equipment in a communication system includes ABCD A. computers B. CRTs D. key board (2) The equipment B D A. manipulates digital information internally in serial form B. manipulates digital information internally in word units C. transfers the number of bits in parallel D. transfers the number of bits in serial form (3)DTE is BD A. Digital T-carrier B. data terminal equipment C. satellite D. the last piece of equipment that belonged to the subscriber in a data link system (4)There are ab between the DtEs A. the modem B communications C. digital-to-analog converter D. will be replaced by an updated standard 3. Translate and analyze the following sentences (5) This equipment generally operates digital information internally in word units
Unit 8 Computer Networking Text 1 Data Communications Exercises 1. Fill in the blanks with appropriate words according to the text. (1) The end equipment is either __generates the digital information for transmission_ or_ uses the received digital data. (2) When digital data are transmitted, they are _in serial form_. (3) _DTE___ is data terminal equipment. (4) _STACO is the corresponding unit at the secondaries. (5) Between the DTEs, first is _the modems_, and then is the communications equipment__. (6) _DCE__ accepts the serial data stream from the DTE. (7) At the transmit end, the modem can be considered a form of _digital-to-analog_ converter, while at the receive end, it can be considered a form of analog-to-digital__ converter. (8) DCE converts the received_ analog signal_ to a serial digital data stream_. 2. Multiple choices. (1) The end equipment in a communication system includes _ABCD_. A. computers B. CRTs C. printers D. keyboards (2) The equipment B_D__. A. manipulates digital information internally in serial form B. manipulates digital information internally in word units C. transfers the number of bits in parallel D. transfers the number of bits in serial form (3) DTE is __BD_. A. Digital T-carrier B. data terminal equipment C. satellite D. the last piece of equipment that belonged to the subscriber in a data link system (4) There are AB_ between the DTEs. A. the modem B. communications equipment C. digital-to-analog converter D. will be replaced by an updated standard 3. Translate and analyze the following sentences. (5) This equipment generally operates digital information internally in word units
句子组成: in word units介词短语作方式状语修饰 operates_ 翻译:这种设备通常在内韶 (6) It converts the received analog signal to a serial digital data stream 句子组成: convert…to指 转换成…… 翻译:它把接收到的模拟信号转换成串行教字教据流 (7) Data communications equipment(DCE) accepts the serial data stream from th DTE 句子组成: from the d正修饰动词 accept 翻译:数据通信设备(DCE〕从DTE接收串行数据流 Reading comprehension Security is an important consideration in the Internet world. The computer has a way of knowing who you are. Most LANs or mainframes require each user to log in, or sign on to the system. To do this, you should type in your user Id before a prompt. You are then prompted for a password. Passwords are special codes you use to "lock" your account. Obviously you need careful about protecting your password if you are building nuclear power plants or something, but what about the rest of us? a student recently got some help from her friend on email. She gave him her password to a class account, and he wrote it down. Apparently some of his buddies found the password and logged in using the students user ID and password, and sent a very obscene message to the class. The student nearly lost her account, because she had been sloppy with her Change you password regularly! Dont use your dogs name. People will guess it Dont use words in English, people can hook up spell checkers Consider combining words and numbers Answer the following questions according to the article above (8) What does the passage mainly discuss? Security is an important consideration in the Internet world. (9)According to the passage, we know security is an important consideration in the Internet world (10)Why the author thinks that is important to protect your password if you are building nuclear power plant or something? Because th ord may be used by other people. (11)At last, the author give some hints, what are they? They are: first. don't use your dogs name. People will guess it. Second. n. people can hook u combining words and numbers Text 2 Architecture of Computer Networks Exercises
句子组成:in word units 介词短语作方式状语修饰 operates 翻译:_这种设备通常在内部以字为单位处理数字信息_____ (6) It converts the received analog signal to a serial digital data stream. 句子组成:convert……to 指将……转换成…… 翻译: 它把接收到的模拟信号转换成串行数字数据流 (7) Data communications equipment (DCE) accepts the serial data stream from the DTE. 句子组成:from the DTE 修饰动词 accept 翻译:数据通信设备(DCE)从 DTE 接收串行数据流 Reading comprehension. Security is an important consideration in the Internet world. The computer has a way of knowing who you are. Most LANs or mainframes require each user to log in, or sign on to the system. To do this, you should type in your user ID before a prompt. You are then prompted for a password. Passwords are special codes you use to “lock” your account. Obviously you need to be careful about protecting your password if you are building nuclear power plants or something, but what about the rest of us? A student recently got some help from her friend on email. She gave him her password to a class account, and he wrote it down. Apparently some of his buddies found the password and logged in using the student’s user ID and password, and sent a very obscene message to the class. The student nearly lost her account, because she had been sloppy with her password. Change you password regularly! Some hints: • Don’t use your dog’s name. People will guess it. • Don’t use words in English, people can hook up spell checkers. • Consider combining words and numbers. Answer the following questions according to the article above. (8) What does the passage mainly discuss? Security is an important consideration in the Internet world. (9) According to the passage, we know security is an important consideration __in the Internet world_. (10) Why the author thinks that is important to protect your password if you are building nuclear power plant or something? Because the password may be used by other people (11) At last, the author give some hints, what are they? They are: first, don’t use your dog’s name. People will guess it. Second, don’t use words in English, people can hook up spell checkers. And last, consider combining words and numbers. Text 2 Architecture of Computer Networks Exercises
1. Fill in the blanks with appropriate words according to the text. (12)Computer network is a complex unit, it consists of two or more connected computing units (13)Design of a network and its logical structure should comply with a set of design princip (14)Two important network architectures are: the OsI reference model and the TCP/P reference model model was created by the ISo (16) Note that the OSI model itself is not a network architecture (17)TCP/IP is a communication protocol, it provides many different networking (18)The TCP/IP Internet protocol suite is formed from two standards: the TCP and the Ip ( 19) TCP/P is the foundation of the Internet as we know it today (20)TCP means it is on the transport layer and IP means it is on the network 2. Decide whether the following statements are True or False (21)Design of a network and its logical structure should comply with a set of design (22) The OSI model was not created by the Iso ×) (23) The network architecture is a layer-based (24)The OSI model is a foundation for all comparing protocols (×) (25) The OSI model is a network architecture (26)The TCP/IP Internet protocol suite is formed from three standards (27)TCP means it is on the network layer and IP means it is on the transport layer 3. Translate and analyze the following sente (28)It is used for the purpose of data communication and resource sharing 句子组成:[代指计算机网络,for引导的短语结构修饰used 翻译:它用于数据通信和资源共享。 (29)They include: the organization of functions, the description of data formats and procedure 句子组成: include引导三个并列结构 翻译:其中包括;功能的组织以及数据格式和过程的说明。 (30)However, ISO has also produced standards for all the lay 句子组成:ho 语气的转折, for all the lavers作目的状语 翻译:然而,ISO还是对各层制定了标准 (31) These protocols are continually changing and evolving to support the needs of the 句子组成: change与 evolve为两个并列动词, of the user community作后置定语修饰ned 翻译:这些协议在用户们的支持下不断地改变和进化着。 (32)TCP/IP is a communication protocol, it provides many different networking services
1. Fill in the blanks with appropriate words according to the text. (12) Computer network is a complex unit, it consists of two or more connected computing units. (13) Design of a network and its logical structure should comply with a set of design principles. (14) Two important network architectures are: the OSI reference model and the TCP/IP reference model. (15) The _OSI__ model was created by the ISO. (16) Note that the OSI model itself is not a network architecture__. (17) TCP/IP is a communication protocol, it provides many different networking services. (18) The TCP/IP Internet protocol suite is formed from two standards :_the TCP__ and the IP__. (19) __TCP/IP__ is the foundation of the Internet as we know it today. (20) TCP means it is on the __transport__ layer and IP means it is on the __network__ layer separately. 2. Decide whether the following statements are True or False. (21) Design of a network and its logical structure should comply with a set of design principles. ( √ ) (22) The OSI model was not created by the ISO. ( × ) (23) The network architecture is a layer-based. ( √ ) (24) The OSI model is a foundation for all comparing protocols. ( × ) (25) The OSI model is a network architecture. ( × ) (26) The TCP/IP Internet protocol suite is formed from three standards. ( × ) (27) TCP means it is on the network layer and IP means it is on the transport layer separately. ( × ) 3. Translate and analyze the following sentences. (28) It is used for the purpose of data communication and resource sharing. 句子组成:it 代指计算机网络,for 引导的短语结构修饰 used 翻译:_它用于数据通信和资源共享。__________________ (29) They include: the organization of functions, the description of data formats and procedure. 句子组成:include 引导三个并列结构 翻译:其中包括:功能的组织以及数据格式和过程的说明。 (30) However, ISO has also produced standards for all the layers. 句子组成:_however 表语气的转折,for all the layers 作目的状语_ 翻译:_然而,ISO 还是对各层制定了标准__ (31) These protocols are continually changing and evolving to support the needs of the user community. 句子组成:change 与 evolve 为两个并列动词,of the user community 作后置定语修饰 need 翻译:__这些协议在用户们的支持下不断地改变和进化着。 (32) TCP/IP is a communication protocol, it provides many different networking services
句子组成:由逗号分隔的两个独立的句子 翻译:TCPP参考模型是一种传输协议,提供了许多不同的网络服 4. Reading comprehension TCP/IP is the underlying protocol of the Internet today. It is the protocol that helps to split messages up, helps them find their way to the correct destination, then causes them rejoin at the destination. TCP/P is very important but you rarely interact with it directly. All the other os take advantage of it TCP/IP has been with us since the earliest days of the aRPANet. It is showing some signs of age, since it is being used for purposes its designers never imagined! Some other approaches underly Internet protocols are being studied. One notable possibility is a concept called ATM (Asynchronous Transfer Mode) IP is the centerpiece of the TCP/IP protocol stack. Much like the center of an hourglass, IP funnels data to and from the protocols above and below it. It lets an internetwork use many different link layer protocols and allows applications to employ different transport layer protocols In many ways, IP is very simple. However, it has one important advantage over simpler protocols: it hide the differences between the datalink protocols from the transport protocols that end-user applications use. By doing this, it enables you to replace old datal ink technologies with newer and faster technologies without having to change application codes. Thus applications written against a transport protocol interface are portable across a wide range of link layer technologies As the TCP/IP Model Link Layer is identical to the OSI Model Data Link Layer, to avoid terminology confusion, we will use the term"datalink" when referring to a protocol at the TCP/lP Model Link Layer or the OSI Model Data Link Layer Answer the following questions according to the article above. (33) What does the passage mainly discuss? TCP/IP is the underlying protocol of the Internet tod (34) According to the passage, the tCP/lP is very important, but you rarely interact with it dire (35)What is the notable possibility concept? (36)As the TCP/IP Model Link Layer is identical to the OSI Model Data Link Layer, you must avoid terminology confusion (37)Why the author think IP is not very simple? Becauase it has one important advantage over simpler protocols: it hides the differences between the datalink protocols from the transport protocols that end-user applications use. Text 3 Local Area Network Exercises 5. Fill in the blanks with appropriate words according to the text. (38) A LAN is a group of computers and the network devices connected together usually within the same building (39) LANS consist of carefully selected groups of components(hardware and software)
句子组成:_由逗号分隔的两个独立的句子 翻译:TCP/IP 参考模型是一种传输协议,提供了许多不同的网络服务。 4. Reading comprehension. TCP/IP is the underlying protocol of the Internet today. It is the protocol that helps to split messages up, helps them find their way to the correct destination, then causes them rejoin at the destination. TCP/IP is very important, but you rarely interact with it directly. All the other protocols take advantage of it. TCP/IP has been with us since the earliest days of the ARPANet. It is showing some signs of age, since it is being used for purposes its designers never imagined! Some other approaches to underly Internet protocols are being studied. One notable possibility is a concept called ATM (Asynchronous Transfer Mode). IP is the centerpiece of the TCP/IP protocol stack. Much like the center of an hourglass, IP funnels data to and from the protocols above and below it. It lets an internetwork use many different link layer protocols and allows applications to employ different transport layer protocols. In many ways , IP is very simple. However, it has one important advantage over simpler protocols: it hides the differences between the datalink protocols from the transport protocols that end-user applications use. By doing this , it enables you to replace old datalink technologies with newer and faster technologies without having to change application codes. Thus applications written against a transport protocol interface are portable across a wide range of link layer technologies. As the TCP/IP Model Link Layer is identical to the OSI Model Data Link Layer, to avoid terminology confusion, we will use the term “datalink” when referring to a protocol at the TCP/IP Model Link Layer or the OSI Model Data Link Layer. Answer the following questions according to the article above. (33) What does the passage mainly discuss? TCP/IP is the underlying protocol of the Internet today. (34) According to the passage, the TCP/IP is very important, but you rarely interact with it directly. (35) What is the notable possibility concept? _____ATM____ (36) As the TCP/IP Model Link Layer is identical to the OSI Model Data Link Layer, you must avoid ___ terminology confusion ___. (37) Why the author think IP is not very simple? Becauase it has one important advantage over simpler protocols: it hides the differences between the datalink protocols from the transport protocols that end-user applications use. Text 3 Local Area Network Exercises 5. Fill in the blanks with appropriate words according to the text. (38) __A LAN__ is a group of computers and the network devices connected together usually within the same building. (39) LANs consist of carefully selected groups of components (hardware and software)
which are configured for the specific requirements of the organization. (40)A LAN is generally limited to the size of a department or an organization and often (41)The three main types of LAN are topology, transmission media and medium (42)Most wide area networks, such as the PSTN, use a mesh topology (43) The four topologies in common use are star, bu (44)Twisted pair, coaxial cable and optical fibre are the three main types of transmission medium used for LANs (45) techniques have been adopted for use of the medium access control in the LANS (46) Two is used to control multiple-access networks (47)Control token is another way of controlling access to a shared transmission medium 6. Decide whether the following statements are True or False (48)A LAN (Local area data networks) is a group of computers and the network devices connected together usually within the different buildings (×) (49)LAN may be used to interconnect computer-based equipment distributed around a factory or hospital complex (50)A LAN is generally limited to the size of a department or an organization and often consists of 2 to 100 devices (51) Most wide area networks, such as the PStn, not use a mesh (sometimes referred to as a network) topology (52)With LANS, the limited physical separation of the subscriber DTEs allows simpler topologies to be used (53)The four topologies in common use are star, router, ring and hub (54)Three techniques have been adopted for use of the medium access control in the LANS (55)Control token is the only way of controlling access to a shared transmission medium 7. Translate and analyze the following sentences (56) By definition, the connections must be high-speed and relatively inexpensive(e.g. token ring or Ethernet) 句子组成: by definition为独立结构,也可以放在句后 翻译:通过定义可知,这种连接冖定是高速并且相对廉价的(如ε令牌网和以太网)s (57)They are configured for the specific requirements of the organization 句子组成:for引导介词短语修饰coniμure,而of引导的名词作后置定语修饰 翻译:它们根据组织的各种特殊需要来配置 (58)Since all the equipment is located within a single establishment, however, LANS are normally installed and maintained by the organization 句子组成:两个分句由转折词 however连接,后半句使用了被动语态 翻译:虽然所有设备限制在一个单一的设施里,但局域网通常由团体安裝和维 (59) LANS consist of carefully selected groups of components(hardware and software)
which are___ configured for the specific requirements of the organization._. (40) A LAN is generally limited to the size of a department or an organization and often consists of___2_ to __100 vices. (41) The three main types of LAN are _topology_, _transmission media_ and _medium access control methods_. (42) Most wide area networks, such as the PSTN, use _a mesh__ topology. (43) The four topologies in common use are star_, __bus__ , _ring__ and __hub__. (44) _Twisted pair_, _coaxial cable_ and _optical fibre__ are the three main types of transmission medium used for LANs. (45) ______ techniques have been adopted for use of the medium access control in the LANs. (46) __Two__ is used to control multiple-access networks. (47) _Control token___ is another way of controlling access to a shared transmission medium . 6. Decide whether the following statements are True or False. (48) A LAN (Local area data networks) is a group of computers and the network devices connected together usually within the different buildings. (× ) (49) LAN may be used to interconnect computer-based equipment distributed around a factory or hospital complex. (× ) (50) A LAN is generally limited to the size of a department or an organization and often consists of 2 to 100 devices. (√ ) (51) Most wide area networks, such as the PSTN, not use a mesh (sometimes referred to as a network) topology. (× ) (52) With LANs, the limited physical separation of the subscriber DTEs allows simpler topologies to be used. (√ ) (53) The four topologies in common use are star, router, ring and hub. (× ) (54) Three techniques have been adopted for use of the medium access control in the LANs. (× ) (55) Control token is the only way of controlling access to a shared transmission medium. (× ) 7. Translate and analyze the following sentences. (56) By definition, the connections must be high-speed and relatively inexpensive (e.g. token ring or Ethernet). 句子组成:by definition 为独立结构,也可以放在句后 翻译:_通过定义可知,这种连接一定是高速并且相对廉价的(如:令牌网和以太网)。 (57) They are configured for the specific requirements of the organization. 句子组成:for 引导介词短语修饰 configure,而 of 引导的名词作后置定语修饰 requirements 翻译:__它们根据组织的各种特殊需要来配置。__ (58) Since all the equipment is located within a single establishment, however, LANs are normally installed and maintained by the organization. 句子组成:_两个分句由转折词 however 连接,后半句使用了被动语态______ 翻译:虽然所有设备限制在一个单一的设施里,但局域网通常由团体安装和维护。 (59) LANs consist of carefully selected groups of components (hardware and software)